Results 31 to 40 of about 787,843 (284)

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +1 more source

Detecting web attacks with end-to-end deep learning

open access: yesJournal of Internet Services and Applications, 2019
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected.
Yao Pan   +6 more
doaj   +1 more source

A Frictionless and Secure User Authentication in Web-Based Premium Applications

open access: yesIEEE Access, 2021
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily.
Rashidah F. Olanrewaju   +4 more
doaj   +1 more source

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Designing and executing a security and usability testing plan: IdeaClick Prototype [PDF]

open access: yes, 2013
The purpose of this thesis was to define, analyse and execute usability and security test-ing plans for an application prototype named IdeaClick. IdeaClick is a web application and its main purpose is to share ideas and provide a means to collaborate on ...
Gutiérrez Gutiérrez, Omar Lenin   +1 more
core   +2 more sources

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]

open access: yes, 2019
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy